000 01936 a2200277 4500
008 210812b ||||| |||| 00| 0 eng d
020 _a9780071823074
020 _a9780071823074 020 0071823077
050 _aQA76.9.A25
_bE39 2017
100 _aElisan, Christopher C.
245 _aHacking exposed :
_bmalware and rootkits : security secrets & solutions /
_cChristopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
250 _a2nd
260 _bMcGraw-Hill Education,
_c2017
_aNew York :
300 _axxii, 360 pages :
_billustrations ;
_c24 cm
500 _aRevised edition of: Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters. 2010
505 _aIncludes index
505 _aPart I : Malware. Malware propagation -- Malware functionality -- Part II : Rootkits. User-mode rootkits -- Kernel-mode rootkits -- Virtual rootkits -- The future of rootkits -- Part III : Prevention technologies. Antivirus -- Host protection systems -- Host-based intrusion prevention -- Rootkit detection -- General security practices
520 _a"Fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop -up and phising exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology."--Back cover
650 _aComputer security
650 _a650 0 Computer networks|xSecurity measures 650 0 Malware (Computer software) 650 0 Rootkits (Computer software)
700 _aDavis, Michael,
_d1982-
700 _aBodmer, Sean,
700 _aLeMasters, Aaron,
760 _bOnline version:|aDavis, Michael, 1982-|tHacking exposed. |dNew York : McGraw-Hill Education, [2017]|z9780071825757 |w(DLC) 2016049606
942 _cBK
_2lcc
999 _c56809
_d56809